Wyniki wyszukiwania dla: trees
-
Characterization of herbal teas containing lime flowers – Tiliae flos by HPTLC method with chemometric analysis
PublikacjaLinden trees are a source of food products called lime flowers (Tiliae flos), traditionally used in the form of infusion for the treatment of feverish colds and coughs. Lime flowers should include flowers of Tilia cordata Mill, T.x europaea L., and T. platyphyllos Scop. or a mixture of these. The aim of current research was to establish a fast, sensitive HPTLC (high-performance thin-layer chromatography) method that would allow...
-
Experience-Driven Model of Decision-Making Processes in Project Teams
PublikacjaThis article presents a model of decision-making processes in project teams. Project teams constitute a specific type of organization appointed to implement a project. Decisions made by project teams result from the methods of project management and best management practices. The authors have undertaken the task of formalizing these processes using the classical method of constructing decision trees. It has been established that...
-
DBpedia and YAGO Based System for Answering Questions in Natural Language
PublikacjaIn this paper we propose a method for answering class 1 and class 2 questions (out of 5 classes defined by Moldovan for TREC conference) based on DBpedia and YAGO. Our method is based on generating dependency trees for the query. In the dependency tree we look for paths leading from the root to the named entity of interest. These paths (referenced further as fibers) are candidates for representation of actual user intention. The...
-
Collision-free network exploration
PublikacjaMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
Testing of Software for the Planning of a Linear Object GNSS Measurement Campaign under Simulated Conditions
PublikacjaThe precision of a linear object measurement using satellite techniques is determined by the number and the relative position of the visible satellites by the receiver. The status of the visible constellation is described by DOP. The obtained geometric coefficient values are dependent on many variables. When determining these values, field obstacles at the receiver location and satellite positions changing with time must be taken...
-
Perfect hashing with pseudo-minimal bottom-up deterministic tree automata
PublikacjaWe describe a technique that maps unranked trees to their hash codes using a bottom-up deterministic tree automaton (DTA). In contrast to techniques implemented with minimal tree automata, our procedure builds a pseudo-minimal DTA. Pseudo-minimal automata are larger than the minimal ones but in turn the mapping can be arbitrary, so it can be determined prior to the automaton construction. We also provide procedures to build incrementally...
-
Ranking Speech Features for Their Usage in Singing Emotion Classification
PublikacjaThis paper aims to retrieve speech descriptors that may be useful for the classification of emotions in singing. For this purpose, Mel Frequency Cepstral Coefficients (MFCC) and selected Low-Level MPEG 7 descriptors were calculated based on the RAVDESS dataset. The database contains recordings of emotional speech and singing of professional actors presenting six different emotions. Employing the algorithm of Feature Selection based...
-
Early warning models against bankruptcy risk for Central European and Latin American enterprises
PublikacjaThis article is devoted to the issue of forecasting the bankruptcy risk of enterprises in Latin America and Central Europe. The author has used statistical and soft computing methods to program the prediction models. It compares the effectiveness of twelve different early warningmodels for forecasting the bankruptcy risk of companies. In the research conducted, the author used data on 185 companies listed on the Warsaw Stock Exchange...
-
On the Hat Problem on the Cycle C7
PublikacjaThe topic is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of a win. In this version every player can...
-
Multi-agent graph searching and exploration algorithms
PublikacjaA team of mobile entities, which we refer to as agents or searchers interchangeably, starting from homebases needs to complete a given task in a graph.The goal is to build a strategy, which allows agents to accomplish their task. We analyze strategies for their effectiveness (e.g., the number of used agents, the total number of performed moves by the agents or the completion time).Currently, the fields of on-line (i.e., agents...
-
Parity vertex colouring of graphs
PublikacjaA parity path in a vertex colouring of a graph is a path along which each colour is used an even number of times. Let Xp(G) be the least number of colours in a proper vertex colouring of G having no parity path. It is proved that for any graph G we have the following tight bounds X(G) <= Xp(G) <=|V(G)|− a(G)+1, where X(G) and a(G) are the chromatic number and the independence number of G, respectively. The bounds are improved for...
-
Scanning networks with cactus topology
PublikacjaThe family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...
-
Common Independence in Graphs
PublikacjaAbstract: The cardinality of a largest independent set of G, denoted by α(G), is called the independence number of G. The independent domination number i(G) of a graph G is the cardinality of a smallest independent dominating set of G. We introduce the concept of the common independence number of a graph G, denoted by αc(G), as the greatest integer r such that every vertex of G belongs to some independent subset X of VG with |X|...
-
2-bondage in graphs
PublikacjaA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...
-
Assessing vehicle restraint systems on horizontal curves
PublikacjaHorizontal curves, an element of road infrastructure, have a statistically high number of accidents. Considering that horizontal curves in the last ten years have had app. 10% of all road accidents representing app. 14% of all fatalities on Polish roads, the issue is serious and requires more research and proper road safety treatments. Data for 2007 - 2016 show that in the case of accidents on horizontal curves app. 45% of the...
-
Prediction of Wastewater Quality at a Wastewater Treatment Plant Inlet Using a System Based on Machine Learning Methods
PublikacjaOne of the important factors determining the biochemical processes in bioreactors is the quality of the wastewater inflow to the wastewater treatment plant (WWTP). Information on the quality of wastewater, sufficiently in advance, makes it possible to properly select bioreactor settings to obtain optimal process conditions. This paper presents the use of classification models to predict the variability of wastewater quality at...
-
Paired domination versus domination and packing number in graphs
PublikacjaGiven a graph G = (V(G), E(G)), the size of a minimum dominating set, minimum paired dominating set, and a minimum total dominating set of a graph G are denoted by γ (G), γpr(G), and γt(G), respectively. For a positive integer k, a k-packing in G is a set S ⊆ V(G) such that for every pair of distinct vertices u and v in S, the distance between u and v is at least k + 1. The k-packing number is the order of a largest kpacking and...
-
Examining Statistical Methods in Forecasting Financial Energy of Households in Poland and Taiwan
PublikacjaThis paper examines the usefulness of statistical methods in forecasting the financial energy of households. The study’s objective is to create the innovative ratios that combine both financial and demographic information of households and implement them in the forecasting models. To conduct this objective, six forecasting models are developed using three different methods—discriminant analysis, logit analysis, and decision trees...
-
Double bondage in graphs
PublikacjaA vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The double domination number of a graph G, denoted by gamma_d(G), is the minimum cardinality of a double dominating set of G. The double bondage number of G, denoted by b_d(G), is the minimum cardinality among all sets...
-
On the size of identifying codes in triangle-free graphs
PublikacjaIn an undirected graph G, a subset C⊆V(G) such that C is a dominating set of G, and each vertex in V(G) is dominated by a distinct subset of vertices from C, is called an identifying code of G. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. For a given identifiable graph G, let gammaID(G) be the minimum cardinality of an identifying code in G. In this paper, we show that for any connected...
-
Hat problem on a graph
PublikacjaThe topic of our paper is the hat problem. In that problem, each of n people is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color looking at the hat colors of the other people. The team wins if at least one person guesses his hat color correctly and no one guesses his hat color wrong, otherwise the team loses. The aim is to maximize the probability of win. In this version every...
-
The Backbone Coloring Problem for Bipartite Backbones
PublikacjaLet G be a simple graph, H be its spanning subgraph and λ≥2 be an integer. By a λ -backbone coloring of G with backbone H we mean any function c that assigns positive integers to vertices of G in such a way that |c(u)−c(v)|≥1 for each edge uv∈E(G) and |c(u)−c(v)|≥λ for each edge uv∈E(H) . The λ -backbone chromatic number BBCλ(G,H) is the smallest integer k such that there exists a λ -backbone coloring c of G with backbone H satisfying...
-
Modele i algorytmy dla grafowych struktur defensywnych
PublikacjaW niniejszej pracy przeprowadzono analizę złożoności istnienia struktur defensywnych oraz równowag strategicznych w grafach. W przypadku struktur defensywnych badano modele koalicji defensywnych, zbiorów defensywnych i koalicji krawędziowych – każdy z nich w wersji globalnej, tj. z wymogiem dominacji całego grafu. W przypadku modeli równowagi strategicznej badano równowagę strategiczną koalicji defensywnych, równowagę strategiczną...
-
Non-isolating 2-bondage in graphs
PublikacjaA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The non-isolating 2-bondage number of G, denoted by b_2'(G), is the minimum cardinality among all sets of edges E' subseteq E such that delta(G-E') >= 1 and gamma_2(G-E') > gamma_2(G)....
-
Non-isolating bondage in graphs
PublikacjaA dominating set of a graph $G = (V,E)$ is a set $D$ of vertices of $G$ such that every vertex of $V(G) \setminus D$ has a neighbor in $D$. The domination number of a graph $G$, denoted by $\gamma(G)$, is the minimum cardinality of a dominating set of $G$. The non-isolating bondage number of $G$, denoted by $b'(G)$, is the minimum cardinality among all sets of edges $E' \subseteq E$ such that $\delta(G-E') \ge 1$ and $\gamma(G-E')...
-
Efficiency of Artificial Intelligence Methods for Hearing Loss Type Classification: an Evaluation
PublikacjaThe evaluation of hearing loss is primarily conducted by pure tone audiometry testing, which is often regarded as golden standard for assessing auditory function. If the presence of hearing loss is determined, it is possible to differentiate between three types of hearing loss: sensorineural, conductive, and mixed. This study presents a comprehensive comparison of a variety of AI classification models, performed on 4007 pure tone...
-
Independent Domination Subdivision in Graphs
PublikacjaA set $S$ of vertices in a graph $G$ is a dominating set if every vertex not in $S$ is adjacent to a vertex in~$S$. If, in addition, $S$ is an independent set, then $S$ is an independent dominating set. The independent domination number $i(G)$ of $G$ is the minimum cardinality of an independent dominating set in $G$. The independent domination subdivision number $\sdi(G)$ is the minimum number of edges that must be subdivided (each...
-
Comparison of Classification Methods for EEG Signals of Real and Imaginary Motion
PublikacjaThe classification of EEG signals provides an important element of brain-computer interface (BCI) applications, underlying an efficient interaction between a human and a computer application. The BCI applications can be especially useful for people with disabilities. Numerous experiments aim at recognition of motion intent of left or right hand being useful for locked-in-state or paralyzed subjects in controlling computer applications....
-
Risk assessment for tram traffic on tramway bridges
PublikacjaMiejski transport szynowy wielu miastach stanowi istotny element systemu transportowego i jest przestrzennie rozwijającym się systemem zapewniającym mieszkańcom codzienną obsługę transportową. Bezpieczeństwo pasażerów transportu szynowego i użytkowników dróg jest jednym z najważniejszych czynników, który należy uwzględnić w trakcie projektowania infrastruktury oraz w ocenie operacyjnej systemu miejskiego transportu tramwajowego....
-
SORPTION OF SELECTED CHLORINATED SOLVENTS ON PLANT DEBRIS COLLECTED IN A CITY PARK
PublikacjaDebris from deciduous trees in the form of park green waste was investigated as a potential biosorbent for the removal of chlorinated solvents from water. The sorption properties of beech leaves and cupules, oak leaves and acorns, birch leaves and lime leaves (all tree species common for a moderate climate) in a non-modified form were investigated with regard to the removal of perchloroethylene, 1,1,2-trichloroethane and 1,1,1,2-tetrachlorothane....
-
Two Approaches to Constructing Certified Dominating Sets in Social Networks
PublikacjaSocial networks are an important part of our community. In this context, certified dominating sets help to find in networks a group of people, referring as officials, such that 1) for each civilian, there is an official that can serve the civilian, and 2) no official is adjacent to exactly one civilian, to prevent potential abuses. To delve deeper into this topic, this study considers two approaches to the problem of finding certified...
-
Speed estimation of a car at impact with a W-beam guardrail using numerical simulations and machine learning
PublikacjaThis paper aimed at developing a new method of estimating the impact speed of a passenger car at the moment of a crash into a W-beam road safety barrier. The determination of such a speed based on the accident outcomes is demanding, because often there is no access to full accident data. However, accurate determination of the impact speed is one of the key elements in the reconstruction of road accidents. A machine learning algorithm...
-
Rewitalizacja historycznego zespołu pałacowo-parkowego w Lokalnym Programie Rewitalizacji Wejherowa (2008-2015). Revitalisation of the Historic Palace and Park in the Local Revitalisation Program of Wejherowo (2008-2015)
PublikacjaW latach 1990. po upadku komunizmu w Polsce, przestrzeń publiczna w Wejherowie - podobnie jak i w innych miastach Polski była w dużym stopniu zdegradowana. W 2008 roku władze miasta Wejherowa opracowały i zatwierdziły "lokalny program rewitalizacji na lata 2008-2015", który dotyczył głównie centrum miasta. Miał on być w dużym stopniu finansowany przez Unię Europejską..Jedną z najbardziej eksponowanych przestrzeni publicznych, które...
-
Dynamic coloring of graphs
PublikacjaDynamics is an inherent feature of many real life systems so it is natural to define and investigate the properties of models that reflect their dynamic nature. Dynamic graph colorings can be naturally applied in system modeling, e.g. for scheduling threads of parallel programs, time sharing in wireless networks, session scheduling in high-speed LAN's, channel assignment in WDM optical networks as well as traffic scheduling. In...
-
Stereo vision with Equal Baseline Multiple Camera Set (EBMCS) for obtaining depth maps of plants
PublikacjaThis paper presents a method of improving the estimation of distances between an autonomous harvesting robot and plants with ripe fruits by using the vision system based on five cameras. The system is called Equal Baseline Multiple Camera Set (EBMCS). EBMCS has some features of a camera matrix and a camera array. EBMCS is regarded as a set of stereo cameras for estimating distances by obtaining disparity maps and depth maps. This...
-
Quantitative Risk Assessment in Construction Disputes Based on Machine Learning Tools
PublikacjaA high monetary value of the construction projects is one of the reasons of frequent disputes between a general contractor (GC) and a client. A construction site is a unique, one-time, and single-product factory with many parties involved and dependent on each other. The organizational dependencies and their complexity make any fault or mistake propagate and influence the final result (delays, cost overruns). The constant will...
-
Hat problem on odd cycles
PublikacjaThe topic is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of a win. In this version every player can...
-
A construction for the hat problem on a directed graph
PublikacjaA team of n players plays the following game. After a strategy session, each player is randomly fitted with a blue or red hat. Then, without further communication, everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. Visibility is defined by a directed graph; that is, vertices correspond to players, and a player can see each player to whom he is connected by an arc. The...
-
On the hat problem on a graph
PublikacjaThe topic of this paper is the hat problem in which each of n players is uniformly and independently fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of winning....
-
Collision-Free Network Exploration
PublikacjaA set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...
-
Detecting type of hearing loss with different AI classification methods: a performance review
PublikacjaHearing is one of the most crucial senses for all humans. It allows people to hear and connect with the environment, the people they can meet and the knowledge they need to live their lives to the fullest. Hearing loss can have a detrimental impact on a person's quality of life in a variety of ways, ranging from fewer educational and job opportunities due to impaired communication to social withdrawal in severe situations. Early...
-
Machine learning-based seismic fragility and seismic vulnerability assessment of reinforced concrete structures
PublikacjaMany studies have been performed to put quantifying uncertainties into the seismic risk assessment of reinforced concrete (RC) buildings. This paper provides a risk-assessment support tool for purpose of retrofitting and potential design strategies of RC buildings. Machine Learning (ML) algorithms were developed in Python software by innovative methods of hyperparameter optimization, such as halving search, grid search, random...
-
Karol Flisikowski dr inż.
OsobyKarol Flisikowski jest profesorem uczelni w Katedrze Statystyki i Ekonometrii, Wydziału Zarządzania i Ekonomii Politechniki Gdańskiej. Jest odpowiedzialny jest za prowadzenie zajęć ze statystyki opisowej i matematycznej (w języku polskim i angielskim), a także badań naukowych w zakresie statystyki społecznej. Był uczestnikiem wielu konferencji o zasięgu krajowym, jak i międzynarodowym, gdzie prezentował wyniki prowadzonych przez...
-
The lognormal model of the multipath fading channel
Dane BadawczeThe dataset contains the results of simulations that are part of the research on modelling the multipath fading in the communication channel. The lognormal fading envelope is generated using the Monte-Carlo simulation (MCS) in the LabVIEW programming environment.
-
Mobile mutual-visibility sets in graphs
PublikacjaGiven a connected graph G, the mutual-visibility number of G is the cardinality of a largest set S such that for every pair of vertices x, y ∈ S there exists a shortest x, y-path whose interior vertices are not contained in S. Assume that a robot is assigned to each vertex of the set S. At each stage, one robot can move to a neighbouring vertex. Then S is a mobile mutual-visibility set of G if there exists a sequence of moves of...
-
Intelligent Decision Forest Models for Customer Churn Prediction
PublikacjaCustomer churn is a critical issue impacting enterprises and organizations, particularly in the emerging and highly competitive telecommunications industry. It is important to researchers and industry analysts interested in projecting customer behavior to separate churn from non‐churn consumers. The fundamental incentive is a firm’s intent desire to keep current consumers, along with the exorbitant expense of gaining new ones....
-
DUAL CONSTELLATION GPS/GALILEO MOBILE SYSTEM FOR IMPROVING NAVIGATION OF THE VISUALLY IMPAIRED IN AN URBAN AREA
PublikacjaIt is well known by users of Portable Navigation Device (PND) and other GPS-based devices that positioning suffers from (local) significant decreases of accuracy in partially obscured environments like urbanized areas, where buildings (especially high buildings), trees or terrain block large portions of the sky. In such areas, GPS receiver performance is usually deteriorated by the reduced number of currently available satellite...
-
DESIGN OF THE DUAL CONSTELLATION GPS/GALILEO MOBILE DEVICE FOR IMPROVING NAVIGATION OF THE VISUALLY IMPAIRED IN AN URBAN AREA
PublikacjaIt is well known by users of Personal Navigation Device (PND) and other GPS-based devices that positioning suffers from (local) significant decreases of accuracy in partially obscured environments like urbanized areas, where buildings (especially high buildings), trees or terrain block large portions of the sky. In such areas, GPS receiver performance is usually deteriorated by the reduced number of currently available satellite...
-
The effect of road restraint systems on the level of road safety - Polish experience
PublikacjaRoadside accidents happen when a vehicle runs off the road. The majority of these accidents are very severe because leaving the road is usually followed by hitting a solid obstacle (tree, pole, support, culvert front wall, barrier). Roadsides are some of the most important issues of road safety. They have been studied for years to identify roadside hazards and the effectiveness of road safety measures such as restraint systems....
-
The Effect of Steaming Beech, Birch and Maple Woods on Qualitative Indicators of the Surface
PublikacjaThis work presents the effect of steaming beech, birch and maple woods on the resulting quality of the milled wood surface. The steaming process of the studied woods results in a targeted change in the color of the wood, which changes from the original light white-gray color to fine reddishbrown to dark brown color shades that are more or less saturated depending on the temperature of the saturated water steam. The color changes...